2018
DOI: 10.1155/2018/1578314
|View full text |Cite
|
Sign up to set email alerts
|

Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO

Abstract: In order to protect computing systems from malicious attacks, network intrusion detection systems have become an important part in the security infrastructure. Recently, hybrid models that integrating several machine learning techniques have captured more attention of researchers. In this paper, a novel hybrid model was proposed with the purpose of detecting network intrusion effectively. In the proposed model, Gini index is used to select the optimal subset of features, the gradient boosted decision tree (GBD… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(35 citation statements)
references
References 46 publications
0
35
0
Order By: Relevance
“…As mentioned earlier, an accurate data-driven diagnostics scheme requires optimal feature selection as it affects the accuracy of the classifier. In a broader context, the use of filter and wrapper feature selection methods for diagnosis spans beyond hydraulic pumps to rolling bearings diagnostics/prognostics [34], gear fault detection [35], wireless sensor network intrusion [36], sentiment classification [37], etc. Wrapper methods (and global search algorithms) are efficient for discovering global solutions to variant problems while most filter methods are faced with diverse issues of instability [38]; nevertheless, as a pre-processing technique, these filter methods-Pearson's correlation, chi-square, linear discriminant analysis, etc.…”
Section: B Meta-heuristic Methods For Feature Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…As mentioned earlier, an accurate data-driven diagnostics scheme requires optimal feature selection as it affects the accuracy of the classifier. In a broader context, the use of filter and wrapper feature selection methods for diagnosis spans beyond hydraulic pumps to rolling bearings diagnostics/prognostics [34], gear fault detection [35], wireless sensor network intrusion [36], sentiment classification [37], etc. Wrapper methods (and global search algorithms) are efficient for discovering global solutions to variant problems while most filter methods are faced with diverse issues of instability [38]; nevertheless, as a pre-processing technique, these filter methods-Pearson's correlation, chi-square, linear discriminant analysis, etc.…”
Section: B Meta-heuristic Methods For Feature Selectionmentioning
confidence: 99%
“…On the other hand, several meta-heuristic feature selection techniques have been proposed in the past including the PSO, Genetic Algorithm, Ant Colony Optimization, scalability, Simulated Annealing, and other embedded methods. Compared with other metaheuristic algorithms PSO has the advantages of ease-of-use, speed, better representation, local minima avoidance, and its primary strength-the capability of global search optimization [18], [36].…”
Section: B Meta-heuristic Methods For Feature Selectionmentioning
confidence: 99%
“…And in the second stage, a BP network is used to identify attack categories in abnormal. Li et al [35] proposed a model combining a Gini index and gradient boosting decision tree (GBDT) with particle swarm optimization (PSO). The optimal feature subset is selected by the Gini index, and the network attack is detected by a gradient lifting decision tree algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…GINI-GBDTPSO [35] 86.10 CNN [43] 79.48 LSTM [44] 92.00 DMNB [45] 96.50 DBN-SVM [46] 92.84 TUIDS [47] 96.55 RNN-IDS [48] 81.29 Our Proposed IDS 99.529 From Tables 4 and 5, our proposed IDS (i.e., the IDS based on the S-ResNet) has higher accuracy than the other IDSs on the NSL-KDD dataset, and higher recall than the other IDSs for each category on the NSL-KDD dataset, especially for R2L and U2R attacks.…”
Section: Idss Accuracy (%)mentioning
confidence: 99%
“…The experiment is conducted in a PC equipped with an Intel G2020 CPU, 8GB RAM, and a Windows 7 operating system. The algorithms commonly used in the domain of intrusion detection are K-Nearest Neighbor (KNN) [33], support vector machine (SVM) [34], Gradient Boosting Decision Tree (GBDT) [35], etc. Their execution effects based on the KDD99 dataset in intrusion detection are shown in Table 4.…”
Section: The Effect Of Classical Classifiers In Intrusion Detectionmentioning
confidence: 99%